A long, long time ago, nearly 4,000 years, in a land far, far away ancient cryptography was born. The Place? Egypt. It is there historians believe the technique was invented by priests as a character substitution for hieroglyphics. Then in Greece, it is believed the ancient Spartan military also relied on cryptography, though it’s not clear if …

Organisations often don’t understand what they need to be protecting themselves from when it comes to costly cyber-attacks. The threat landscape is becoming ever-more evolved and it’s now rare for a day to go by without a new form of attack hitting the headlines. Interventions by hacking groups into foreign affairs, such as reports …

77 percent of respondents to a study conducted by Ponemon Institute admit they do not have a formal cyber security incident response plan (CSIRP) applied consistently across their organization. Nearly half of the 2800 respondents reported that their incident response plan is either informal/ad hoc or completely non-existent. Senior …

A critical vulnerability in the Credential Security Support Provider protocol (CredSSP), introduced in Windows Vista and used in all Windows versions since then, can be exploited by MitM attackers to run code remotely on previously uninfected machines and servers in the attacked network. About CredSSP CredSSP provides single sign-on (SSO) and …

What's New

Intel has officially pushed out microcode updates with Spectre and Meltdown mitigations for all of the processors it launched in the past five years. In addition to this, the company’s CEO announced new, redesigned processor lines that …

Artificial intelligence (AI) has worked its way into a variety of industries, from the obvious (autonomous vehicles) to the hidden (anti-money laundering due diligence). But according to a new report from Tractica, while organizations are …

New findings from a study by Veritas Technologies, indicate that 60 percent of respondents have not fully evaluated the cost of a cloud outage to their business and are therefore ill prepared to deal with the impact of an outage. While cloud …

A long, long time ago, nearly 4,000 years, in a land far, far away ancient cryptography was born. The Place? Egypt. It is there historians believe the technique was invented by priests as a character substitution for hieroglyphics. Then in …

A new (ISC)2 report measures minority representation in the U.S. cybersecurity profession and aims to understand the challenges these highly skilled individuals experience. Average salary by minority group (In $1,000 USD) “While minority …

Malware news

Comodo released its Global Malware Report 2017, which culminates a year of security analysis and research into threat patterns. Among its major findings: 2017 was a year of multiple geopolitical events that corresponded with major malware spikes …

Whitepapers and insight

The CISSP Exam Study Guide provides a solid foundation for anyone preparing to become a Certified Information Systems Security Professional. It contains materials to prepare you for all 8 domains of the CISSP exam. In this guide you’ll …